Movatterモバイル変換


[0]ホーム

URL:


US20240314154A1 - Systems and methods of generating automatic suggestions to change infrastructure as code to remediate cloud security issues - Google Patents

Systems and methods of generating automatic suggestions to change infrastructure as code to remediate cloud security issues
Download PDF

Info

Publication number
US20240314154A1
US20240314154A1US18/601,507US202418601507AUS2024314154A1US 20240314154 A1US20240314154 A1US 20240314154A1US 202418601507 AUS202418601507 AUS 202418601507AUS 2024314154 A1US2024314154 A1US 2024314154A1
Authority
US
United States
Prior art keywords
assets
cloud
code
inventory
iac
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/601,507
Inventor
Avi SHUA
Yoav ALON
Lior Drihem
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orca Security Ltd
Original Assignee
Orca Security Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orca Security LtdfiledCriticalOrca Security Ltd
Priority to US18/601,507priorityCriticalpatent/US20240314154A1/en
Assigned to Orca Security LTD.reassignmentOrca Security LTD.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ALON, Yoav, DRIHEM, LIOR, SHUA, AVI
Publication of US20240314154A1publicationCriticalpatent/US20240314154A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Embodiments of the present disclosure include a non-transitory computer readable medium that when executed by at least one processor cause the at least one processor to generate automatic suggestions for changes to infrastructure as code (IaC) to remediate cloud security issues, the operations comprising: scanning at least one cloud account; generating an inventory of cloud assets based on the scanning of the at least one cloud account; scanning at least one repository of source files of an infrastructure as code (IaC) associated with the at least one cloud account; creating an inventory of IaC assets; matching each asset of the inventory of cloud assets with one or more assets of the inventory of IaC assets; identifying a vulnerability in at least one asset of the inventory of cloud assets; determining at least one asset of the inventory of IaC assets associated with the at least one asset of the inventory of cloud assets based on the matching; and generating at least one alert.

Description

Claims (18)

What is claimed is:
1. A non-transitory computer readable medium containing instructions that when executed by at least one processor cause the at least one processor to generate automatic suggestions for changes to infrastructure as code (IaC) to remediate cloud security issues, the operations comprising:
scanning at least one cloud account;
generating an inventory of cloud assets based on the scanning of the at least one cloud account, the inventory of cloud assets including assets of the at least one cloud account;
scanning at least one repository of source files of an infrastructure as code (IaC) associated with the at least one cloud account;
creating an inventory of IaC assets, the inventory of IaC assets including assets managed by the infrastructure as code (IaC);
matching each asset of the inventory of cloud assets with one or more assets of the inventory of IaC assets;
identifying a misconfiguration in at least one asset of the inventory of cloud assets;
determining at least one asset of the inventory of IaC assets associated with the at least one asset of the inventory of cloud assets based on the matching; and
generating at least one alert, the at least one alert including one or more of information associated with the misconfiguration, a remediation suggestion, an activatable remediation control, and a pull request.
2. The non-transitory computer readable medium ofclaim 1, the operations further comprising:
determining at least one code module in the infrastructure as code (IaC) responsible for managing at least one asset of the inventory of IaC assets; and
generating a remediation suggestion, the remediation suggestion including a change to code included in the determined at least one code module.
3. The non-transitory computer readable medium ofclaim 2, the operations further comprising:
determining at least one code owner of the determined at least one code module; and
sending the alert to the determined at least one code owner.
4. The non-transitory computer readable medium ofclaim 1, wherein the pull request is automatically generated.
5. The non-transitory computer readable medium ofclaim 3, wherein the determined at least one code owner of the determined at least one code module includes an attribution based on blame capabilities.
6. The non-transitory computer readable medium ofclaim 1, wherein the at least one repository of source files is a git repository.
7. A method for generating automatic suggestions for changes to infrastructure as code (IaC) to remediate cloud security issues, the method comprising:
scanning at least one cloud account;
generating an inventory of cloud assets based on the scanning of the at least one cloud account, the inventory of cloud assets including assets of the at least one cloud account;
scanning at least one repository of source files of an infrastructure as code (IaC) associated with the at least one cloud account;
creating an inventory of IaC assets, the inventory of IaC assets including assets managed by the infrastructure as code (IaC);
matching each asset of the inventory of cloud assets with one or more assets of the inventory of IaC assets;
identifying a misconfiguration in at least one asset of the inventory of cloud assets;
determining at least one asset of the inventory of IaC assets associated with the at least one asset of the inventory of cloud assets based on the matching; and
generating at least one alert, the at least one alert including one or more of information associated with the misconfiguration, a remediation suggestion, an activatable remediation control, and a pull request.
8. The method ofclaim 7, the method further comprising:
determining at least one code module in the infrastructure as code (IaC) responsible for managing at least one asset of the inventory of IaC assets; and
generating a remediation suggestion, the remediation suggestion including a change to code included in the determined at least one code module.
9. The method ofclaim 8, the method further comprising:
determining at least one code owner of the determined at least one code module; and
sending the alert to the determined at least one code owner.
10. The method ofclaim 7, wherein the pull request is automatically generated.
11. The method ofclaim 9, wherein the determined at least one code owner of the determined at least one code module includes an attribution based on blame capabilities.
12. The method ofclaim 7, wherein the at least one repository of source files is a git repository.
13. A system for generating automatic suggestions for changes to infrastructure as code (IaC) to remediate cloud security issues, the system comprising:
at least one processor configured to:
scan at least one cloud account;
generate an inventory of cloud assets based on the scanning of the at least one cloud account, the inventory of cloud assets including assets of the at least one cloud account;
scan at least one repository of source files of an infrastructure as code (IaC) associated with the at least one cloud account;
create an inventory of IaC assets, the inventory of IaC assets including assets managed by the infrastructure as code (IaC);
match each asset of the inventory of cloud assets with one or more assets of the inventory of IaC assets;
identify a misconfiguration in at least one asset of the inventory of cloud assets;
determine at least one asset of the inventory of IaC assets associated with the at least one asset of the inventory of cloud assets based on the matching; and
generate at least one alert, the at least one alert including one or more of information associated with the misconfiguration, a remediation suggestion, an activatable remediation control, and a pull request.
14. The system ofclaim 13, wherein the at least one processor is further configured to:
determine at least one code module in the infrastructure as code (IaC) responsible for managing at least one asset of the inventory of IaC assets; and
generate a remediation suggestion, the remediation suggestion including a change to code included in the determined at least one code module.
15. The system ofclaim 14, wherein the at least one processor is further configured to:
determine at least one code owner of the determined at least one code module; and
send the alert to the determined at least one code owner.
16. The system ofclaim 13, wherein the pull request is automatically generated.
17. The system ofclaim 15, wherein the determined at least one code owner of the determined at least one code module includes an attribution based on blame capabilities.
18. The system ofclaim 13, wherein the at least one repository of source files is a git repository.
US18/601,5072023-03-162024-03-11Systems and methods of generating automatic suggestions to change infrastructure as code to remediate cloud security issuesPendingUS20240314154A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US18/601,507US20240314154A1 (en)2023-03-162024-03-11Systems and methods of generating automatic suggestions to change infrastructure as code to remediate cloud security issues

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US202363490585P2023-03-162023-03-16
US18/601,507US20240314154A1 (en)2023-03-162024-03-11Systems and methods of generating automatic suggestions to change infrastructure as code to remediate cloud security issues

Publications (1)

Publication NumberPublication Date
US20240314154A1true US20240314154A1 (en)2024-09-19

Family

ID=92713753

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US18/601,507PendingUS20240314154A1 (en)2023-03-162024-03-11Systems and methods of generating automatic suggestions to change infrastructure as code to remediate cloud security issues

Country Status (1)

CountryLink
US (1)US20240314154A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20200012480A1 (en)*2018-07-052020-01-09Jpmorgan Chase Bank, N.A.Method and system for implementing a cloud infrastructure visualizer and generator
US20210203731A1 (en)*2019-12-302021-07-01Servicenow, Inc.Discovery of cloud-based infrastructure and resources
US20230044491A1 (en)*2018-12-142023-02-09Amazon Technologies, Inc.Resolving configuration drift for computing resource stacks
US20230164174A1 (en)*2021-11-242023-05-25Wiz, Inc.Techniques for lateral movement detecton in a cloud computing environment
US20240220304A1 (en)*2022-12-302024-07-04Darktrace Holdings LimitedCyber security system with enhanced cloud-based metrics

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20200012480A1 (en)*2018-07-052020-01-09Jpmorgan Chase Bank, N.A.Method and system for implementing a cloud infrastructure visualizer and generator
US20230044491A1 (en)*2018-12-142023-02-09Amazon Technologies, Inc.Resolving configuration drift for computing resource stacks
US20210203731A1 (en)*2019-12-302021-07-01Servicenow, Inc.Discovery of cloud-based infrastructure and resources
US20230164174A1 (en)*2021-11-242023-05-25Wiz, Inc.Techniques for lateral movement detecton in a cloud computing environment
US20240220304A1 (en)*2022-12-302024-07-04Darktrace Holdings LimitedCyber security system with enhanced cloud-based metrics

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Chinamanagonda, Sandeep. "Automating infrastructure with infrastructure as code (iac)." Available at SSRN 4986767 (2019). (Year: 2019)*

Similar Documents

PublicationPublication DateTitle
US11637855B2 (en)Systems and methods for managing cyber vulnerabilities
US11652852B2 (en)Intrusion detection and mitigation in data processing
US10834108B2 (en)Data protection in a networked computing environment
US10862920B2 (en)Systems and methods for dynamic network security control and configuration
KR20250111404A (en)System and method for cloud-based control-plane event monitor
KR20190090037A (en) Systems and methods for cloud-based operating system event and data access monitoring
US9781124B2 (en)Container-based system administration
US11481478B2 (en)Anomalous user session detector
Hassan et al.Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
US10938849B2 (en)Auditing databases for security vulnerabilities
WO2022229731A1 (en)Systems and methods for side scanning
US20240386113A1 (en)Detecting and preventing code execution vulnerability
US20240314154A1 (en)Systems and methods of generating automatic suggestions to change infrastructure as code to remediate cloud security issues
US20250080574A1 (en)Systems and methods of agent and agentless collaboration in cloud infrastructure security
UdayakumarDesign and deploy security for infrastructure, data, and applications
US20250291903A1 (en)Detection and prevention of login attacks
TakagiSecurity and Privacy Framework for a Cloud Native Platform
Caballero◾ Advanced Private Cloud Computing Security Architectures
OlurinIntrusions Detection in a Cloud Environment

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:ORCA SECURITY LTD., ISRAEL

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHUA, AVI;ALON, YOAV;DRIHEM, LIOR;SIGNING DATES FROM 20230313 TO 20230316;REEL/FRAME:067368/0911

STPPInformation on status: patent application and granting procedure in general

Free format text:ALLOWED -- NOTICE OF ALLOWANCE NOT YET MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS


[8]ページ先頭

©2009-2025 Movatter.jp